It depends a bit on what infrastructure is in front of it. If there is a LB or firewall it makes it harder, but you can check for common files with a program like Nikto or nessus and I'm sure there are a dozen other web server fingerprint programs out there.
If you can directly contact the host you may be able to connect to other services such as RPC/SNMP and get more information. Or use a net
Forum: Networking

Most of his posts were 4+ years ago, the forums haven't been doing much for about a year, pretty much when I decided approve all new users to stop spam. I'm sure the lag time in approving them has caused a lot of people that would have posted to not.
Forum: Intro

Looks like I fucked up the admin console a few months back and it wasn't sending out emails for new registrations...so that's fixed and I just approved a lot of old registered users and deleted a fuckload of spam. I probably deleted users as well, just reregister and I'll try and pay attention to what I'm doing this time.
Forum: News and Links

The proper terminology is probably too boring for the most part, though one can hope.. And though I agree hardware hacking is often portrayed unrealistically, I think it has a far higher chance of being closer to reality than hacking a website.
Forum: News and Links

That's cool, I've been hired to test security for games, but never to show them how to make hacking realistic. I bet they get bored fast...
Hardware hacking is probably more realistic for a game, lockpicking/rewiring, etc.
Forum: News and Links

dhcpcd is basically the same as dhclient, though it seems to be a little less configurable. It does seem that it is configurable enough to at least chance most of the information it is leaking. http://manpages.ubuntu.com/manpages/karmic/man8/dhcpcd-bin.8.html
Forum: Privacy

I don't know about Linux, but on FreeBSD you can send whatever you want via the /etc/dhclient.conf.
Worst case, hack the source code, I doubt it's hard to figure out where the client is gathering/sending that info.
Forum: Privacy

I've cracked my way into a mid-size (~400M) trading firm's data center via biometric thumb scan using a pencil, tape and a copy machine. The first thing out of their security guy's mouth was "you're fuckin fucking me fuck, fuck fuck". It was supposed to be active biometrics, using both the fingerprint and checking for blood flow or heat, I'm not sure which, but it turns out my thumb push
Forum: Privacy

old thread, but PC-BSD rocks, I don't use full desktops, just 2x27" monitors filled with term windows (12 virtual desktops each), but if I had to set my mom up with a desktop it would be PC-BSD.
Forum: OMG Ponies

on any *NIX system you should have a command called "file", it uses something called "magic" (not joking). Basically it looks at file headers to determine the file type by querying a database.
man file
man magic
Forum: OMG Ponies

Nice job!
you might also want to add John the Ripper has support for cracking DB passwords.
you can also get there using Metasploit:
http://www.metasploit.com/modules/auxiliary/analyze/jtr_mssql_fast
Forum: News and Links